VIP: a Virtual Interface-based approach for vertical handover in single-subnet networks
|
|
|
- Marion Lloyd
- 10 years ago
- Views:
Transcription
1 VIP: a Virtual Interface-based approach for vertical handover in single-subnet networks Wei-Cheng Xiao, Shih-Hsuan Tang, and Cheng-Fu Chou Department of Computer Science and Information Engineering National Taiwan University {b89099, r93057, ccf}@csie.ntu.edu.tw Ling-Jyh Chen Institute of Information Science Academia Sinica [email protected] Abstract We propose a simple and practical solution, called the Virtual Interface-based approach (VIP), for seamless vertical handover in single-subnet networks. VIP combines a virtual interface and ARP update messages to achieve vertical handovers, and can run stand-alone without modification of existing network protocols or installation of additional servers. Therefore, it is ready for immediate realworld deployment. Using testbed experiments, we evaluate VIP by observing TCP (FTP downloading) behavior in various vertical handover scenarios. The results show that the proposed approach can successfully maintain an application s connectivity in all test cases. Furthermore, the results show that handover from a low capacity link to a high capacity link does not cause service latency; however, during handover from a high capacity link to a lower capacity link, non-negligible latency can not be alleviated unless early handover notification is provided. 1. Introduction With the growing demands of mobile and wireless applications, the need for a simple yet efficient seamless handover solution that can transparently switch a connection across different network technologies (i.e., vertical handover) is becoming increasingly important. For instance, a user may have to switch an ongoing connection from Ethernet to IEEE b because he/she has roamed out of the cable range, or switch the connection from IEEE b to IEEE a because the former s channels suffer from serious interference. A seamless handover solution with both low latency and low packet loss is essential for mobile users who wish to receive continuous, uninterrupted network service while switching from one network connection to another. Additionally, the handover solution should be network-layer-transparent and infrastructure-modificationfree so that existing network applications can accommodate the changes wrought by the rapid evolution of wireless technology. The goal of seamless handover is to provide continuous connections for end-to-end data transmissions in the event of any link outage or handover anomaly. This involves two critical design issues: low latency and low packet loss. Low latency requires that the switch to the new path must be completed almost instantaneously; that is, service interruption should be minimized to provide the illusion of continuous connectivity. In the event of an actual connection failure, the architecture must attempt to re-connect the client as soon as the service is restored. Furthermore, packet loss due to the connection switching must also be minimized. Various seamless vertical handover solutions have been proposed in the last decade. Based on their implementations in the OSI 7 layer network model, the schemes can be grouped into three main categories: network layer approaches [6] [13], transport layer approaches [2] [12] [15] [18], and upper layer approaches [4] [7] [11] [14] [16]. All the schemes have two properties in common: (1) they support vertical handover across different network domains; and (2) they are not stand alone approaches (i.e., they have to either modify existing network protocols like TCP/IP, or otherwise install additional servers on the Internet); thus, deployment of these approaches is considered costly. In this paper, we propose a Virtual Interface based approach (VIP) that not only satisfies the requirements for
2 seamless vertical handover, but is also simple, light-weight, and ready for real deployment immediately. Unlike previous handover schemes, VIP concentrates on the emerging scenarios of single-subnet networks (e.g., home networking, campus networking, and office networking), and trades the support of handover across multiple network domains for simplicity in the approach s design. More precisely, VIP cleverly combines the use of a virtual interface and ARP update messages to achieve vertical handover, and can run stand-alone without modification of existing network protocols/applications or installation of additional servers/services. Using testbed experiments, we evaluate VIP by observing TCP (FTP downloading) behavior in various vertical handover scenarios. The results show that VIP can successfully maintain an application s connectivity in all cases. Furthermore, the results show that handover from a low capacity link to a high capacity link does not cause service latency; however, during handover from a high capacity link to a lower capacity link, non-negligible latency can not be alleviated unless early handover notification is provided. The rest of the paper is organized as follows. In Section 2, we summarize related work and recap the definition of vertical handover. Section 3 describes the enabling mechanisms behind VIP. Section 4 contains the experiment results for various vertical handover scenarios. Finally, in Section 5 we present our conclusions. 2. Background and Related Work Vertical handover is the process of switching an ongoing network connection from one interface to another interface [17], as shown in Fig. 1. With the eventual unification of cellular and IP networks, providing seamless vertical handover support for mobile users has become increasingly important and desirable. The biggest challenge in designing a seamless vertical handover scheme lies in maintaining an established application session, such as a connectionoriented flow like TCP, while providing smooth (low loss) and fast (low delay) data transmission. Mobile IP, a network layer solution for vertical handover scenarios, is the current IETF standard for Internet mobility support [13]. It ensures the delivery of packets to a mobile host by using a home address, instead of sending them directly via the mobile host s current Internet address (i.e., its care-of address). An address translator is deployed on the home agent, and an IP tunnel between the home agent and a foreign agent is carefully maintained; therefore, after handover to the foreign agent s network, all ongoing traffic destined for the home agent will be forwarded to the foreign agent (and then to the mobile host) through the IP tunnel. As a result, handover to the upper layer applications is transparent, and the connectivity can be maintained. IPv6 [6], the subsequent network layer protocol, provides native mobility support. By combining the home address and the care-of address into a 128-bit Internet address, IPv6 can easily support vertical handover scenarios without deploying foreign agents and address translators on the home agents. Besides network layer solutions, several handover solutions use transport layer approaches [2] [12] [15] [18]. In [2], the authors proposed the use of Indirect TCP (I-TCP), which deals with handovers by splitting a connection into two segments: a fixed (wired) connection, and a mobile (wireless) connection. However, I-TCP is expensive to deploy and suffers from loss of end-to-end semantics. Meanwhile, in [12] [18], a multi-homing technique is used to support vertical handover. The deployment of the above solutions requires upgrading of both of the transport layer and the applications on mobile hosts and Internet servers. Consequently, the deployment cost is still too high. Another end-to-end approach supports host mobility by dynamically updating the Domain Name System (DNS) and adding a set of Migrate options to TCP [15]. However, this scheme not only requires mobile hosts to be updated, but also calls for all DNS servers worldwide to be upgraded, which is obviously impractical. Additionally, several proxy-based solutions have been proposed to address network heterogeneity problems, such as mobility and vertical handover [4] [7] [11] [14] [16]. Using a split-connection proxy, the mobile host can maintain application sessions virtually, even in the presence of vertical handovers. Although the end-to-end semantics can be preserved, since the handover is transparent to the transport and application layers, such proxy-based solutions suffer from scalability problems due to the limited resources and computational capability of individual proxies. 3. Proposed Approach: VIP Figure 1. Horizontal and Vertical Handover In this section, we present our proposed vertical handover scheme, called VIP (a Virtual Interface-based approach). Unlike previous handover schemes, VIP is de-
3 Figure 2. Basic system design of the OSI network architecture. signed for the specialized and emerging scenarios of singlesubnet networks (e.g., home networking, campus networking, and office networking), and trades the support of universal handovers across multiple network domains for simplicity in the approach s design. As a result, VIP is simple and practical, and does not need to change upper-layer applications/protocols or deploy additional servers on the Internet. In the following, we discuss VIP in details Basic Ideas As mentioned previously, VIP is designed for the specialized and increasingly popular scenarios where vertical handover takes place within the same subnet (e.g., a user may employ an Ethernet connection in his/her cubicle, but has to hand over to Wi-Fi when leaving for the conference room). It is not the goal of VIP to provide a universal solution for vertical handovers across the heterogeneous networks of different network domains. In VIP, a Virtual Interface Layer (VIL) is inserted between the network layer and the data link layer, as illustrated in Fig. 2. The VIL is composed of two components, namely the Virtual Interface (VI) and the Kernel Interface Selector (KIS). It is the responsibility of KIS to determine the best physical network interface and link it to the virtual interface (VI). The decision about the best network interface (i.e., the one that can yield the best network performance at the time) is beyond the scope of this paper, but the issue has been addressed by several previous studies [3] [10] [19] [20]. Note that the VI is a dummy network interface that does Figure 3. When handover occurs, an ARP message is sent out to update the ARP table on the gateway. not exist physically. However, the VIP scheme assigns an IP address to the VI (instead of the selected physical network interface) and treats it as the default networking interface of the mobile host (i.e., the communications of the upper layer applications are bound to the VI, instead of to physical interfaces). Once a physical interface has been selected and linked (by KIS), the VIP scheme ensures that all outgoing traffic is sent from the VI, through the selected physical interface, and then to the network. The scheme also ensures that all incoming traffic is forwarded from the active (selected) physical interface, to the VI, and then to the system kernel. Since all network interfaces (including the VI and the physical ones) are within the same subnet, end-to-end connectivity can be easily maintained during vertical handovers. Next, we describe our implementation in details.
4 3.2. VIP Implementation The proposed VIP scheme is implemented by dynamically invoking the ARP update messages that link the MAC address of a newly selected interface to the VI to complete a vertical handover. We denote the IP address of the VI as IP s, the MAC address of the physical interface employed before the vertical handover as MAC old, and the MAC address of the newly selected network interface for vertical handover as MAC new. Fig. 3 illustrates the vertical handover process, where a mobile host (sender) communicates with a receiver on the Internet via a gateway. The vertical handover takes place on the first hop link (i.e., the link between the sender and the gateway). As shown in Fig. 3, the mobile host (MH) uses the original physical interface to communicate with the receiver initially. In the packet header of each outgoing packet of the MH, the MAC address and IP address are set to MAC old and IP s respectively. Note that, while the IP s is employed as an identity for Internet routing purposes, MAC old is used for data transmission on the last hop (i.e., from the gateway to the sender). Therefore, the gateway host also maintains an ARP table to translate IP addresses into MAC addresses for last-mile connection. Of course, the ARP table has an entry with the IP s mapped to MAC old before the vertical handover occurred. When a vertical handover is triggered 1, the sender immediately transmits an ARP update message (i.e., IP s mapped to MAC new ) to the gateway, which will then update its ARP table accordingly. As a result, all subsequent incoming packets (i.e., from the gateway to the sender) will be forwarded to the interface whose MAC address is the same as MAC new. Thus, vertical handover (from the initial interface with MAC old to the newly selected interface with MAC new ) can be achieved seamlessly. 4. Evaluation 4.1. VIP Testbed First, we describe the VIP testbed and experiments. The mobile host is a Linux based laptop (Debian Linux with kernel version ) with an Intel Pentium M 1.73 GHz CPU and 512MB Memory, as shown in Fig. 4. The Internet gateways are set up using two wireless access points: a Linksys WAP55AG router, and a Buffalo WLA2-G54C 1 As mentioned previously, we do not implement an intelligent handover manager [3] [10] [19] [20] since it is beyond the scope of this study. Instead, in the current work, all vertical handovers are triggered manually by simply writing commands to a pre-defined file in the /proc filesystem of the Linux system, which will promptly respond accordingly. The /proc filesystem can be thought as an interface for exchanging messages/commands between the user and the kernel spaces. Figure 4. Illustration of the VIP testbed. The MH is equipped with an IEEE a interface and an IEEE b interface, both of which operate within the same subnet. access point. In the experiment, the Linksys router is configured to serve as an IEEE a access point, while the Buffalo access point provides an IEEE b connection. Both the a and b networks are configured within the same subnet. Specifically, the mobile host is equipped with a builtin Intel PRO/Wireless 2200BG NIC and a PCMCIA-based wireless NIC (which is a D-Link DWL-AG a/b/g Wireless NIC). The former is used to set up an IEEE b connection to the Buffalo access point, and the latter is used for the IEEE a connection to the Linksys router. First, we evaluate vertical handover from the b connection to the a connection (i.e., LOW to HIGH), followed by handover from a to b (i.e., HIGH to LOW). In each experiment, the MH downloads a large file from a remote FTP server during the vertical handover. We run Ethereal [1] on the MH to capture all outgoing/incoming packets on the virtual interface for further analysis. The experiment results are presented below Experiment I: Vertical Handover from Low to High In the first experiment, we perform vertical handovers from the low bandwidth link (i.e., IEEE b, 11Mbps mode) to the higher one (i.e., IEEE a, 54Mbps mode). The vertical handover is triggered manually at about 7.2 seconds. Fig. 5 depicts the TCP performance during the handover. From Fig. 5, we observe that the average TCP throughput increases from 1,000 KBps to about 2,700 KBps after the LOW-to-HIGH vertical handover, and the sequence number curve of the TCP connection does not exhibit additional latency during the handover. Vertical handover to the upper layer FTP applications is seamless and transparent. Moreover, the TCP session can take advantage of the
5 (a) TCP Sequence Number (b) FTP Throughput Figure 5. The changes in the TCP sequence number and FTP throughput before and after handover in the first experiment (802.11b to a). (a) TCP Sequence Number (b) FTP Throughput Figure 6. The changes in the TCP sequence number and FTP throughput before and after handover in the second experiment (802.11a to b).
6 increased bandwidth after the vertical handover because of its AIMD-based congestion control algorithm Experiment II: Vertical Handover from High to Low In the second experiment, the vertical handover is from the high bandwidth link (i.e., IEEE a, 54Mbps mode) to the lower link (i.e., IEEE b, 11Mbps mode), and is triggered manually at about 10.0 seconds. Fig. 6 shows the TCP performance during vertical handover. Fig. 6-a shows that the sequence number curve of the TCP connection increased monotonically during the transmission, but held for several microseconds when the HIGHto-LOW vertical handover was triggered. Meanwhile, Fig. 6-b shows that the simultaneous TCP throughput dropped to almost zero when the vertical handover occurred, and then returned to about 1,000 KBps after a few microseconds. The results demonstrate that the TCP session can be maintained by the proposed VIP scheme during HIGH-to- LOW vertical handover; however, the ongoing TCP connection will be frozen for several microseconds. We repeated the experiment 10 times and found the freeze period was about 0.12ms in average. The reason for the freeze period is because the TCP connection stored a few packets on the last hop link (i.e., between the MH and the IEEE a access point), and these outstanding packets are lost when HIGH-to-LOW vertical handover occurs, as shown in Fig. 7. The bulk packet loss causes contiguous TCP timeouts and thus degrades the throughput performance of FTP downloading. This problem can be resolved by employing specialized TCP variants (e.g., Freeze-TCP [8]), or by implementing other QoS enhancement schemes (e.g., Explicit Handover Notifications [9] or ERR+EHN [5]). Figure 7. The shaded region represents the amount of outstanding data that will be lost during HIGH-TO-LOW vertical handover. 5. Conclusion We have proposed a simple and practical vertical handover solution, called VIP, for single subnet scenarios. VIP is seamless and does not necessitate any modifications of the current network infrastructure. Using testbed experiments, we evaluated VIP in two home networking scenarios. The results show that our method can maintain an application s connectivity (i.e., TCP session) without introducing additional latency during a vertical handover. We also discussed the QoS issue of TCP connection in HIGH-to-LOW vertical handover scenarios. In our ongoing work, we will investigate vertical handover scenarios, in which the link capacity and round-trip delay may change dramatically after handover, and design appropriate adaptation schemes so that applications can adapt more effectively in mobile computing environments. 6. Acknowledgements This material is based upon work supported by the National Science Council under grant number NSC E References [1] Ethereal: A network protocol analyzer. [2] A. Bakre and B. Badrinath. I-tcp: Indirect tcp for mobile hosts. In IEEE ICDCS, [3] L.-J. Chen, T. Sun, B. Chen, and M. Gerla. A smart decision model for vertical handoff. In The 4th ANWIRE International Workshop on Wireless Internet and Reconfigurability, [4] L.-J. Chen, T. Sun, and M. Gerla. Usha: A practical vertical handoff solution. In IEEE MSAN, [5] L.-J. Chen, G. Yang, T. Sun, M. Y. Sanadidi, and M. Gerla. Enhancing qos support for vertical handoffs using implicit/explicit handoff notifications. In QShine, [6] S. Deering and R. Hinden. Internet protocol, version 6 (ipv6) specification. Technical report, IETF RFC 2460, December [7] V. Ghini, G. Pau, M. Roccetti, and P. S. M. Gerla. Smart download on the go: A wireless internet application for music distribution over heterogeneous networks. In IEEE ICC, [8] T. Goff, J. Moronski, and D. S. Phatak. Freeze-tcp: A true end-to-end tcp enhancement mechanism for mobile environments. In IEEE Infocom, [9] A. Gurtov and J. Korhonen. Measurement and analysis of tcp-friendly rate control for vertical handovers. ACM MCCR, [10] B. Liang, A. H. Zahran, and A. O. Saleh. Applicaion signal threshold adaptation for vertical handoff in heterogeneous wireless networks. In IFIP Networking, 2005.
7 [11] D. A. Maltz and P. Bhagwat. Msocks: An architecture for transport layer mobility. In IEEE Infocom, pages , March [12] A. Matsumoto, M. Kozuka, K. Fujikawa, and Y. Okabe. Tcp multi-home options. Technical report, draft-arifumi-tcp-mh- 00.txt, IETF Internet draft, October [13] C. Perkins. Ip mobility support for ipv4. Technical report, IETF RFC 3344, August [14] M. Schlager, B. Rathke, S. Bodenstein, and A. Wolisz. Advocating a remote socket architecture for internet access using wireless lans. Journal of Mobile Networks and Applications, 6:23 42, [15] A. Snoeren. A Session-Based Approach to Internet Mobility. PhD thesis, Massachusetts Institute of Technology, December [16] A. C. Snoeren and H. Balakrishnan. An end-to-end approach to host mobility. In ACM MobiCom, [17] M. Stemm and R. H. Katz. Vertical handoffs in wireless overlay networks. ACM Mobile Networking (MONET), [18] R. Stewart, Q. Xie, K. Morneault, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson. Stream control transmission protocol. Technical report, IETF RFC 2960, October [19] H. Wang, R. H. Katz, and J. Giese. Policy-enabled handoffs across heterogeneous wireless networks. In ACM WMCSA, [20] F. Zhu and J. McNair. Optimization for vertical handoff decision algorithms. In IEEE WCNC, 2004.
Network Friendliness of Mobility Management Protocols
Network Friendliness of Mobility Management Protocols Md Sazzadur Rahman, Mohammed Atiquzzaman Telecommunications and Networks Research Lab School of Computer Science, University of Oklahoma, Norman, OK
TCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
Mobile Communications Chapter 9: Mobile Transport Layer
Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery
119, Munjiro, Yuseong-gu, Daejeon, Korea. {neofaith, mckim, torshong, kangsw}@icu.ac.kr 2 InfraLab, Korea Telecom
A Mobility Management Scheme using - for Realtime Services across Heterogeneous Networks Hyelim Park 1 Myungchul Kim 1 Sooyong Lee 1 Sungwon Kang 1 Yongho Kim 2 1 School of Engineering, Information and
Mobile SCTP Transport Layer Mobility Management for the Internet
Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: [email protected] Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: [email protected]
Mobile Computing/ Mobile Networks
Mobile Computing/ Mobile Networks TCP in Mobile Networks Prof. Chansu Yu Contents Physical layer issues Communication frequency Signal propagation Modulation and Demodulation Channel access issues Multiple
An enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS
AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Network Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. [email protected]
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
An Experimental Study on Wireless Security Protocols over Mobile IP Networks
An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: [email protected] Jorinjit S. Gill Department of Electrical and
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)
Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected]
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, [email protected] 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
ECHO: A Quality of Service based Endpoint Centric Handover scheme for VoIP
ECHO: A Quality of Service based Endpoint Centric Handover scheme for VoIP John Fitzpatrick, Seán Murphy, Mohammed Atiquzzaman*, John Murphy Performance Engineering Lab, School of Computer Science and
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
The Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Fibre Channel over Ethernet in the Data Center: An Introduction
Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification
TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to
Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr
A Performance Study of VoIP Applications: MSN vs. Skype
This full text paper was peer reviewed by subject matter experts for publication in the MULTICOMM 2006 proceedings. A Performance Study of VoIP Applications: MSN vs. Skype Wen-Hui Chiang, Wei-Cheng Xiao,
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks
Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory
CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces
1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with
Performance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
IT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013
the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Forced Low latency Handoff in Mobile Cellular Data Networks
Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN [email protected]
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
WAN Performance Analysis A Study on the Impact of Windows 7
A Talari Networks White Paper WAN Performance Analysis A Study on the Impact of Windows 7 Test results demonstrating WAN performance changes due to upgrading to Windows 7 and the network architecture and
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS
MOBILITY SUPPORT USING INTELLIGENT USER SADOWS FOR NEXT-GENERATION WIRELESS NETWORKS Gergely V. Záruba, Wei Wu, Mohan J. Kumar, Sajal K. Das enter for Research in Wireless Mobility and Networking Department
A Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 [email protected]
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
SJBIT, Bangalore, KARNATAKA
A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert
Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks
Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks Anders Nilsson, Ali Hamidian, Ulf Körner Department of Communication Systems Lund University, Sweden Box118,221Lund
Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
Boosting mobility performance with Multi-Path TCP
Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
Lecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network
Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149
A Network-Controlled Architecture for SCTP Hard Handover
A Network-Controlled Architecture for SCTP Hard Handover Khadija Daoud, Karine Guillouard, Philippe Herbelin Orange Labs, Issy Les Moulineaux, France {first name.last name}@orange-ftgroup.com Abstract
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Networking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Performance Comparison of SCTP and TCP over Linux Platform
Performance Comparison of SCTP and TCP over Linux Platform Jong-Shik Ha, Sang-Tae Kim, and Seok J. Koh Department of Computer Science, Kyungpook National University, Korea {mugal1, saintpaul1978, sjkoh}@cs.knu.ac.kr
WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP
WEB SERVER PERFORMANCE WITH CUBIC AND COMPOUND TCP Alae Loukili, Alexander Wijesinha, Ramesh K. Karne, and Anthony K. Tsetse Towson University Department of Computer & Information Sciences Towson, MD 21252
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA [email protected] Hesham El-Rewini Southern Methodist University
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
